Next Article in Journal
Entropy Methods in Guided Self-Organisation
Previous Article in Journal
A Further Indication of the Self-Ordering Capacity of Water Via the Droplet Evaporation Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System

by
Laszlo B. Kish
1,*,† and
Claes-Göran Granqvist
2,†
1
Department of Electrical and Computer Engineering, Texas A&M University, College Station, TX 77843-3128, USA
2
Department of Engineering Sciences, The Ångström Laboratory, Uppsala University, P.O. Box 534, SE-75121 Uppsala, Sweden
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Entropy 2014, 16(10), 5223-5231; https://doi.org/10.3390/e16105223
Submission received: 10 September 2014 / Revised: 23 September 2014 / Accepted: 28 September 2014 / Published: 7 October 2014

Abstract

:
We introduce the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchange system. This attack utilizes the lack of exact thermal equilibrium in practical applications and is based on cable resistance losses and the fact that the Second Law of Thermodynamics cannot provide full security when such losses are present. The new attack does not challenge the unconditional security of the KLJN scheme, but it puts more stringent demands on the security/privacy enhancing protocol than for any earlier attack. In this paper we present a simple defense protocol to fully eliminate this new attack by increasing the noise-temperature at the side of the smaller resistance value over the noise-temperature at the side with the greater resistance. It is shown that this simple protocol totally removes Eve’s information not only for the new attack but also for the old Bergou-Scheuer-Yariv attack. The presently most efficient attacks against the KLJN scheme are thereby completely nullified.
PACS Codes: PACS 72.70.+m; PACS 89.20.Ff; PACS 89.90.+n

1. Introduction

The Kirchhoff-law–Johnson-noise (KLJN) scheme [1,2], shown in Figure 1, is a classical statistical physical competitor to a quantum key distribution for secure communication. For the duration of a single bit exchange, the communicating parties (Alice and Bob) connect their randomly chosen resistor and corresponding noise-voltage generator to a wire line (cable). These resistors are randomly selected from the publicly known set {RL, RH}, RLRH, where the elements represent low (L) and high (H) bit values. The Gaussian voltage noise generators—mimicking the Fluctuation-Dissipation Theorem and delivering band-limited white noise with publicly agreed bandwidth—produce enhanced thermal (Johnson) noise at a publicly agreed effective temperature Teff, typically being Teff ≥109K [3], so the temperature of the wire can be neglected. The noises are statistically independent of each other and from the noise of the former bit period.
In the case of secure bit exchange—i.e., the LH or HL bit situations for Alice and Bob—an eavesdropper (Eve) cannot distinguish between these two situations by measuring the mean-square value of the voltage Uc(t) and/or current Ic(t) in the cable, because both arrangements lead to the same result. In the rest of the paper we assume that one of these secure bit exchange situations (either LH or HL) apply.
To avoid potential information leak by variations in the shape of a probability distribution, the noises are Gaussian [1], and it has been proven that other distributions are not secure [4,5]. From a physics perspective, the security is provided by the Second Law of Thermodynamics because directional information, due to the direction of power flow, does not exist since the mean power flow is zero even though the LH and HL situations have asymmetric resistance arrangements [1]. In other words, the security of the ideal KLJN scheme against passive (non-invasive listening/measuring) attacks is as strong as the impossibility to build a perpetual motion machine of the second kind. The security against active (invasive) attacks is—perhaps surprisingly—provided by the robustness of classical physical quantities, which guarantees that these quantities can be monitored (and their integrity with the cable parameters and model can be checked) continuously without destroying their values. We observe, in passing, that the situation is totally different for the case of quantum physics.
The most famous and explored, and so far the most effective, attack against the non-ideal KLJN scheme is the Bergou-Scheuer-Yariv (BSY) cable resistance attack [6,7] which utilizes the fact that, due to the non-zero cable resistance, the mean-square voltage will be slightly less at the cable end with the smaller resistance value than at the other end with the greater resistance. It should be noted that the results (including their physical units) are wrong in [7], but a correct evaluation of the BSY effect was carried out later by Kish and Scheuer (KS) [8]. Eve’s measured absolute difference between the mean-square voltages U cH 2 ( t ) and U cL 2 ( t ) of the “H” and “L” ends (cf. Figure 2) is given by [8]
Δ KS = | U cH 2 ( t ) - U cL 2 ( t ) | = 4 k T eff Δ f | R c 2 ( R H - R L ) ( R H + R c + R L ) 2 | ,
where k is Boltzmann’s constant, Δf is noise bandwidth and Rc is cable resistance. Clearly ΔKS scales with the square of the cable resistance, i.e., Δ KS R c 2.

2. Results and Discussion

2.1. The Second-Law-Attack

In the rest of the paper we use the rules about transformations of noise spectra in linear systems, along with Johnson’s formula for thermal noise, and write [1]
U R 2 ( t ) = 4 k T eff R Δ f .
Here U R 2 ( t ) denotes mean-square voltage fluctuations on the resistor, with resistance R, within the bandwidth Δf.
The cable resistance has a non-zero value, and therefore the resistors and their noise generators are not in thermal equilibrium in practical versions of the KLJN system (with Teff much greater than the cable temperature). Consequently the Second Law of Thermodynamics cannot provide full security. The cable-heating powers by the generators at the “H” and “L” ends are different and are given by
P Hc = I A 2 ( t ) R c = 4 k T eff R H Δ f ( R H + R c + R L ) 2 R c ,
and
P Lc = I B 2 ( t ) R w = 4 k T eff R L Δ f ( R H + R c + R L ) 2 R c = P Hc R L R H .
The difference between PHc and PLc can be utilized for the Second-Law-attack, because the resistor values RH and RL are publicly known. The implementation of this attack is to measure and compare the net power flows at the two ends of the cable, as illustrated in Figure 2. The mean power flow PHL from the “H” end toward the “L” end of the cable, and the mean power flow PLH from the “L” end toward the “H” end are, respectively,
P HL = U H 2 ( t ) ( R c + R L R H + R c + R L ) 2 1 R c + R L - U L 2 ( t ) ( R H R H + R c + R L ) 2 1 R H = 4 k T eff Δ f R H ( R c + R L ) - R L R H ( R H + R c + R L ) 2 = 4 k T eff Δ f R H R c ( R H + R c + R L ) 2
and
P LH = U L 2 ( t ) ( R c + R H R H + R c + R L ) 2 1 R c + R H - U H 2 ( t ) ( R L R H + R c + R L ) 2 1 R L = 4 k T eff Δ f R L ( R c + R H ) - R H R L ( R H + R c + R L ) 2 = 4 k T eff Δ f R L R c ( R H + R c + R L ) 2 .
The power flows PHL and PLH are directly measurable by Eve, and their difference,
Δ P HL = P HL - P LH = 4 k T eff Δ f R c ( R H + R L ) ( R H + R c + R L ) 2 ,
gives the difference between the powers supplied by the two cable ends; with the measured cable voltages and current (see Figure 2) it is
Δ P HL = P HL - P LH = I c ( t ) U cH ( t ) - - I c ( t ) U cL ( t ) = [ U cH ( t ) + U cL ( t ) ] I c ( t ) .
It should be observed that the opposite current sign at the “L” end expresses the fact that the current flowing out from the “H” end is flowing into the “L” end (using the same current sign would instead provide the power dissipated in the cable resistance, which is always positive and gives no directional information).
Suppose now that Eve measures the above current-voltage cross-correlations at the two ends and evaluates the pertinent quantities. With the notation introduced in Figure 3, one finds that
Δ P AB = P AB - P BA = [ U cA ( t ) + U cB ( t ) ] I c ( t ) .
As an example, suppose that RH has the greater resistance value and RL the smaller one, i.e., RL < RH. In the ideal case, when Rc = 0, one obtains ΔPAB = 0 in accordance with the Second Law of Thermodynamics, which yields 〈Uc (t)Ic (t)〉 = 0. However, in the practical case, with Rc > 0, one finds
(i)
if ΔPAB > 0, then Alice has RH and Bob has RL,
(ii)
if ΔPAB < 0, then Alice has RL and Bob has RH.
The signal inherent in the Second-Law-attack scales linearly with Rc, which provides a much better situation for Eve—especially in the case of vanishing cable resistance—than the square-law scaling of the BSY attack. Moreover, it is also obvious that in a practical case [3,9,10], where RcRLRH, Eve’s signal-to-noise ratio is always greater in the Second-Law-attack than in the BSY attack. This is so because the BSY attack evaluates the dc fraction of R c 2 / ( R L R H ) in the measured (empirical) mean-square channel noise voltage, while the Second-Law-attack evaluates the dc fraction of Rc/RH in the measured mean power flow. It should be noted that the measured mean-square channel noise voltage, and the measured mean power flow, follow similar statistics because they are the time average of the products of Gaussian processes [11].
The Second-Law-attack is an elegant and efficient one, but it does not challenge the unconditional security of the KLJN scheme [2]. Eve’s probability p of successful guessing can arbitrarily approach the limit p = 0.5 by proper tuning of the parameters inherent in the KLJN scheme, such as resistances and bandwidth, and privacy amplification can be implemented if needed; this was evaluated in detail elsewhere [2], where relationships were reported between security level, cable parameters and communication speed. Nevertheless the new Second-Law-attack is important and may significantly increase the demands on parameter tuning and/or necessitate elaborate privacy amplification [12], which of course comes at a cost.
In the rest of this paper we demonstrate two methods capable of fully eliminating the Second-Law attack. The advanced method nullifies the BSY attack as well.

2.2. Natural/“Simple” Defense

Suppose it is possible to keep the cable and the resistors at the same temperature. This temperature-equilibration method virtually eliminates any Second-Law-attack information for Eve (but not the information in the BSY-attack, albeit its formula for the information leak is changed).
Temperature equilibration constitutes a very simple defense, but the cable temperature and its possible variations cannot be neglected any longer. If the cable temperature is different from that of the resistors, then the KLJN scheme is vulnerable to the Hao-type attack [13] (see its criticism in [14]). In principle, with cables of homogeneous temperatures, this attack can be avoided if Alice and Bob are able to monitor the temperature value of the cable by resistance and Johnson noise measurements, since they can then choose Teff to be the same as the cable temperature. While these steps can be taken, the KLJN scheme is no longer simple. Moreover, the mentioned defense method may be unpractical because of the requirement of a homogeneous cable temperature, small noise levels, and since it prohibits the adoption of enhanced KLJN methods wherein Alice and Bob eliminate their own contributions in order to accomplish higher speed, security [9,15] and fidelity [16].

2.3. Advanced Defense, Also Eliminating All Cable Resistance Attacks

As we have seen, the cable end with the smaller resistance value emits less power toward the other end, and this is the foundation of the Second-Law-attack. This effect, as well as Eve’s related signal, can be completely eliminated by properly changing the ratio of the noise-temperatures of the generators for the resistors with the smaller and the greater resistance values (see Figure 4).
Suppose now that we introduce an offset in the noise-temperatures of the generators for the RH and the RL resistors so that the equation
Δ P HL = P HL ( T eff ) - P LH ( β T eff ) = 0
holds, where Teff is the noise temperature at the RH resistors and βTeff is the noise temperature of the RL resistors. The solution of equation (10) is
β = 1 + R c R L 1 + R c R L .
This value of β for the temperature-offset consequently eliminates Eve’s opportunity to use the Second-Law-attack. One finds β > 1 for RL < RH and β <1 for RH < RL.
The remaining, essential question is whether the defense method delineated above introduces a higher signal for Eve’s BSY-attack or not. Reevaluating our analysis [8] of the BSY attack with the a temperature offset given by Eq. 11, one obtains
Δ KS ( T eff , β T eff ) = | U cH 2 ( t ) - U cL 2 ( t ) | = 4 k T eff Δ f R H | R c 2 ( 1 - α β ) - α R H R c ( β - 1 ) ( R H + R c + R L ) 2 | ,
where α = R L R H. By substituting the above value for β, the nominator becomes zero so that
Δ KS ( T eff , β T eff ) = | U c H 2 ( t , T eff ) - U c L 2 ( t , β T eff ) | = 0
Hence a modification of the noise temperature of the generators supplying the noise of the RL resistors by the factor β yields a complete elimination the strongest attacks against the KLJN key exchange scheme, namely the Second-Law-attack and the BSY-attack [68].

3. Conclusions

We introduced the so far most efficient attack against the Kirchhoff-law-Johnson-noise (KLJN) secure key exchanger, i.e., the Second-Law-attack. This attack utilizes the lack of exact thermal equilibrium in practical applications involving cables with non-zero resistance and results in more advantageous scaling and signal-to-noise ratio for Eve.
Late-note: It has come to our attention that Gunn-Allison-Abbott [17] has published a paper about a new type of attack against the KLJN system, where the attack produces signal for Eve only at non-zero wire resistance. Based on our manuscript on arXiv, they tested the defense method described above in Section 2.3 and found it working even in their system. We agree with this statement of their paper. Note, we extensively analyzed and criticized all their other claims of their preprint in two separate papers or ours [18,19]. Furthermore, they note that the “measurement” of α may be not obvious [17] from a security point of view. This is a misunderstanding by them [17] because Alice and Bob know and continuously monitor [19] all their system parameters, including α.

Author Contributions

The Authors contributed equally to the paper. Both authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Kish, L.B. Totally secure classical communication utilizing Johnson (-like) noise and Kirchoff’s law. Phys. Lett. A 2006, 352, 178–182. [Google Scholar]
  2. Kish, L.B.; Granqvist, C.G. On the security of the Kirchhoff-law-Johnson-noise (KLJN) communicator. Quantum Inf. Process 2014, 13, 2213–2219. [Google Scholar]
  3. Mingesz, R.; Gingl, Z.; Kish, L.B. Johnson (-like)-Noise-Kirchhoff-loop based secure classical communicator characteristics, for ranges of two to two thousand kilometers, via model-line. Phys. Lett. A 2008, 372, 978–984. [Google Scholar]
  4. Gingl, Z.; Mingesz, R. Noise properties in the ideal Kirchhoff-law-Johnson-noise secure communication system. PLoS ONE 2014, 9. [Google Scholar] [CrossRef]
  5. Mingesz, R.; Vadai, G.; Gingl, Z. What kind of noise guarantees security for the Kirchhoff-Loop-Johnson-noise key exchange? Fluct. Noise Lett 2014, 13. [Google Scholar] [CrossRef]
  6. Cho, A. Simple noise may stymie spies without quantum weirdness. Science 2005, 309, 2148. [Google Scholar]
  7. Scheuer, J.; Yariv, A. A classical key-distribution system based on Johnson (like) noise—How secure? Phys. Lett. A 2006, 359, 737–740. [Google Scholar]
  8. Kish, L.B.; Scheuer, J. Noise in the wire: The real impact of wire resistance for the Johnson (-like) noise based secure communicator. Phys. Lett. A 2010, 374, 2140–2142. [Google Scholar]
  9. Kish, L.B. Enhanced secure key exchange systems based on the Johnson-Noise scheme. Metrol. Meas. Syst 2013, 20, 191–204. [Google Scholar]
  10. Kish, L.B.; Abbott, D.; Granqvist, C.G. Critical analysis of the Bennett–Riedel attack on secure cryptographic key distributions via the Kirchhoff-law-Johnson-noise scheme. PLoS ONE 2013, 8. [Google Scholar] [CrossRef]
  11. Kish, L.B.; Mingesz, R.; Gingl, Z.; Granqvist, C.G. Spectra for the product of Gaussian noises. Metrol. Meas. Syst 2012, 19, 653–658. [Google Scholar]
  12. Horvath, T.; Kish, L.B.; Scheuer, J. Effective privacy amplification for secure classical communications. EPL (Europhys. Lett.) 2011, 94. [Google Scholar] [CrossRef]
  13. Hao, F. Kish’s key exchange scheme is insecure. IEE Proc. Inf. Secur 2006, 153, 141–142. [Google Scholar]
  14. Kish, L.B. Response to Feng Hao’s paper “Kish’s key exchange scheme is insecure”. Fluct. Noise Lett 2006, 6. [Google Scholar] [CrossRef]
  15. Smulko, J. Performance analysis of the “intelligent” Kirchhoff-law-Johnson-noise secure key exchange. Fluct. Noise Lett 2014, 13. [Google Scholar] [CrossRef]
  16. Saez, Y.; Kish, L.B.; Mingesz, R.; Gingl, Z.; Granqvist, C.G. Current and voltage based bit errors and their combined mitigation for the Kirchhoff-law-Johnson-noise secure key exchange. J. Comput. Electron 2014, 13, 271–277. [Google Scholar]
  17. Gunn, L.J.; Allison, A.; Abbott, D. A directional wave measurement attack against the Kish key distribution system. Sci. Rep 2014, 4. [Google Scholar] [CrossRef]
  18. Chen, H.P.; Kish, L.B.; Granqvist, C.G.; Schmera, G. Do electromagnetic waves exist in a short cable at low frequencies? What does physics say? Fluct. Noise Lett 2014, 13. [Google Scholar] [CrossRef]
  19. Chen, H.P.; Kish, L.B.; Granqvist, C.G.; Schmera, G. On the “cracking” scheme in the paper “A directional coupler attack against the Kish key distribution system” by Gunn, Allison and Abbott. Metrol. Meas. Syst 2014, 21, 389–400. [Google Scholar]
Figure 1. Schematic of the Kirchhoff-law-Johnson-noise secure key exchange system. To defend against active and hacking attacks, the cable parameters and integrity are randomly monitored; the instantaneous voltage Uc(t) and current Ic(t)amplitudes in the cable are measured and compared via public authenticated data exchange; and full spectral and statistical analysis/checking is carried out by Alice and Bob R, t and Teff denote resistance, time and effective temperature, respectively. Line filters, etc., are not shown.
Figure 1. Schematic of the Kirchhoff-law-Johnson-noise secure key exchange system. To defend against active and hacking attacks, the cable parameters and integrity are randomly monitored; the instantaneous voltage Uc(t) and current Ic(t)amplitudes in the cable are measured and compared via public authenticated data exchange; and full spectral and statistical analysis/checking is carried out by Alice and Bob R, t and Teff denote resistance, time and effective temperature, respectively. Line filters, etc., are not shown.
Entropy 16 05223f1
Figure 2. Scheme devised to illustrate the Bergou-Scheuer-Yariv attack and the Second-Law-attack. Alice’s and Bob’s locations are arbitrary in the figure. During the Second-Law-attack, the powers flowing out from the “H” and “L” ends of the cable are calculated and compared. The temperature of the cable resistor Rc can be neglected because of the high noise temperature of the generators. The notation is consistent with that in Figure 1.
Figure 2. Scheme devised to illustrate the Bergou-Scheuer-Yariv attack and the Second-Law-attack. Alice’s and Bob’s locations are arbitrary in the figure. During the Second-Law-attack, the powers flowing out from the “H” and “L” ends of the cable are calculated and compared. The temperature of the cable resistor Rc can be neglected because of the high noise temperature of the generators. The notation is consistent with that in Figure 1.
Entropy 16 05223f2
Figure 3. Eve’s measurements during the Second-Law-attack. The powers flowing out from the two ends of the cable are measured and compared. The notation is consistent with that in Figure 1.
Figure 3. Eve’s measurements during the Second-Law-attack. The powers flowing out from the two ends of the cable are measured and compared. The notation is consistent with that in Figure 1.
Entropy 16 05223f3
Figure 4. Schematic for illustrating the elimination of the Second-Law-attack and the BSY-attack by introduction of a proper temperature offset. The notation is consistent with that in Figure 1.
Figure 4. Schematic for illustrating the elimination of the Second-Law-attack and the BSY-attack by introduction of a proper temperature offset. The notation is consistent with that in Figure 1.
Entropy 16 05223f4

Share and Cite

MDPI and ACS Style

Kish, L.B.; Granqvist, C.-G. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System. Entropy 2014, 16, 5223-5231. https://doi.org/10.3390/e16105223

AMA Style

Kish LB, Granqvist C-G. Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System. Entropy. 2014; 16(10):5223-5231. https://doi.org/10.3390/e16105223

Chicago/Turabian Style

Kish, Laszlo B., and Claes-Göran Granqvist. 2014. "Elimination of a Second-Law-Attack, and All Cable-Resistance-Based Attacks, in the Kirchhoff-Law-Johnson-Noise (KLJN) Secure Key Exchange System" Entropy 16, no. 10: 5223-5231. https://doi.org/10.3390/e16105223

Article Metrics

Back to TopTop